Monday, September 30, 2019

Its me,,,i want boyfriend

The project would start with a photography contest in the city that according to â€Å"Tex† will lend a human face to â€Å"hookers† or â€Å"whores†, who also have human rights and need government protection. Tex said â€Å"as long as poverty is there, you expect more people to engage in prostitution. † He said there are about 500,000 sex workers in the country, 3,000 of whom are in Baguio City, one of the country's top tourist draws. Nation ( Article MRec ), pagematch: 1, sectionmatch: 1 Among others, Filipino sex workers face health issues, made worse by fear of being enied access to health services., which has began â€Å"talking† to and organizing sex workers in Baguio, Tex said, has taken note of various anecdotes, illustrating the stigma that sex workers face as they have yet to secure recognition from the government. â€Å"In the most extreme (cases), we hear of sex workers complaining of rape to authorities, but rarely get serious results on the ground that they are not believed to have been raped because they are prostitutes. As if sex workers have no rights,† Tex said. In Baguio, more than 300 sex workers, mostly street ookers including males, are â€Å"talking† with WHORE.When finally given legal recognition, the advocacy group, a member of the Asia Pacific Sex Workers Union and the Sex Workers ASEAN (Association of Southeast Asian Nations) group, said sex workers â€Å"can become members of unions fghting for their rights and welfare. † In Thailand, sex workers are recognized by the government and are able to raise their concerns to the government. â€Å"But we are not going for decriminalizing sex workers while criminalizing clients like the Swedish model,† Tex said. â€Å"It didn't even work here. WHORE'S advocacy is facing daunting challenges, however. For one, the Catholic church here headed by Catholic Vicar Carlito Cenzon of the Baguio Vicariate is opposing the legalization of se x workers. â€Å"No way', Cenzon said. Even the supposedly liberal women's group Gabriela is against legalizing prostitution. â€Å"Legalizing [prostitution] is not an option, but instead [the government must] remove them (prostitutes) from poverty,† said Cordillera women Igorot leader Mila Singson, regional coordinator of the Gabriela Women's partylist.Although Singson said her roup has rescued a number of women who became sex slaves, she believes that â€Å"women involved in prostitution should be criminalized. † The UN report â€Å"Sex Work and the Law in Asia and the Pacific† said that â€Å"legal recognition of sex work as an occupation enables sex workers to claim benefits, to form or Join unions and to access work-related banking, insurance, transport and pension schemes. â€Å"In decriminalized context,† it says, â€Å"the sex industry can be subject to the same general laws regarding workplace health and safety and anti-discrimination protecti ons as other industries. 00 Decriminalization, according to the UN involves the repeal of laws criminalizing sex work, being clients to sex workers or engaging in activities associated with sex work. 00 It should also repeal laws that require mandatory testing or treatment for human immunodeficiency virus (HIV) or other ST's, as well as laws that allow detention of sex workers for rehabilitation or correction.

Sunday, September 29, 2019

Benefits of a cashless society Essay

It cannot be denied that there is a wide variety of benefits to be gained by a society from a cashless system. In a society where time is as important as money, going cashless can be a big help since the main benefit that a society can get from a cashless system is convenience. A cashless system can be convenient when doing transactions in banks, restaurants, hospitals, airlines, shopping malls, supermarkets, and even in vending machines. Who would have thought that a small piece of plastic card can do wonders for men? Instead of having a hard time finding the exact amount of coins or cash in one’s pocket to pay for a cup of coffee or a can of soda in a vending machine, a person can just insert this piece of plastic card through the slot. Instantly, the exact amount of his purchase is deducted accurately from the amount on the card. Can one imagine how dirty money is? The money that keeps on passing from hand to hand is dirty. Numerous hands will handle this money until it becomes worn out and be recalled and replaced by the government. The handling of money from one individual to another provides an easy way for bacteria to spread quickly. Cashless transactions in restaurants will provide for proper hygiene since the staff will no longer have to handle cash and at the same time handle the food being served. Instead of falling in line and paying for food that has gone cold due to having waited so long to be served, an employee can now enjoy his break from office, and will therefore be encouraged to go back and patronize the restaurant. Likewise, a person will no longer suffer the inconvenience of falling in line in supermarkets, shopping malls and hospitals to pay their bills at the cashier. Since there will no longer be cash to steal, bank and store robberies will cease to occur. There will also be a decrease in attacks on cashiers, storekeepers, taxi drivers, and shoppers. There will be a decrease in crime rates, and so society will no longer have to pay huge amount of tax dollars to go after the criminals. There is no more reason for society to worry about these crimes. The change from cash to electronic money payment will also help the government in their collection of unpaid taxes. The taxes can be automatically deducted from a person’s account. The government will no longer have to spend much money in tracking down tax evaders. Income tax rates can be lowered as a result and the national debt will be greatly reduced. Drug trafficking will also cease to occur since anomalous transactions will be detected electronically. It will also be difficult for some people to launder money since a cashless system will be able to tell how much money was debited or credited in a particular bank account. Not having to print money will prove to be advantageous to the government since it will mean security and cost savings. Counterfeiting of paper currency will now be a thing of the past. In a cashless society, printing of paper money will no longer be necessary. When previously a person will have to buy stamps and envelopes to mail checks as payments, a person can now easily complete cashless transactions. Even on days when the banks are closed, a person can make transactions provided he has internet connection. A person can also make purchases without the use of cash. He can buy products through the internet when he is at home or with the use of credit cards when he in a shopping mall. In a cashless society, instead of paying with cash, employers can have the amount credited to their employees account. This is being done with the use of the Automated Teller Machine (ATM). The employer is then spared from the expense, added time, and inconvenience of going to the bank to withdraw the salaries. It has been said that cashless transactions have been around since the 1960’s. But it has been more prevalent in today’s society. Today, people benefit from cashless transactions through the use of ATMs, debit and credit cards, prepayment cards, the smart cards, or the mobile cash. A handful of people who are against a cashless society have brought up a number of disadvantages such as security and privacy being lost. With proper analysis and study, these drawbacks can be solved. Despite their concerns, it seems obvious that the advantages to be gained from it far outweigh the disadvantages. For in a society that prefers convenience and cost savings, having a cashless society will prove to be more beneficial. REFERENCE Our cashless Future†¦ (27 June 2007). TadpoleNet. Tadpole Technews News and Politics. . . Accessed 29March 2008.

Saturday, September 28, 2019

Bru Tripura Vision Essay

According to the legends one of the Tripuri prince was expatriated by the king, who along with his followers migrated to the Mayani Thalang area of Lushai hills and founded a state over there. He proclaim as king of the state and the descendant of the exiled Tripuri prince ruled over the state for generations. In due course of time there was no heir to succeed the throne, which lead to anarchy in the kingdom. Owing to some internal feud and vendetta four chief of the sub tribes, namely Twikluha, Yongsika, Paisika, Tuibruha and their entourage left their hearth and home and migrated through Chittagong to the state of Tripura centuries ago. These Reang chiefs could not climb up the Dombur hill peak for two consecutive times and succeeded in third times. Mahendra Manikya was at the throne of Tripura kingdom. After reaching to the capital, these chiefs tried to persuade the ministers and other bureaucrats to give them permission to meet the king and submit their memorandum but was not successful in doing so. By then they have exhausted whatever food and edible they had brought with them and suffered a lot. They were very sad and disheartened by this. They were determined to send the message of their arrival to the king anyhow. In order to send information to the king they broke the dam of the river Gumti where worship was going on at that time. This was a serious crime and all of them were brought before the king. The king ordered them capital punishment. Somehow this news came to Queen Gunoboti. The chiefs prayed in front of the queen who after persuading the king motivated to forgive these chiefs of their crime, who letter forgave them. Since then the Reangs became very obedient and loyal to the queen and throne of Tripura. It is said that the ueen Gunoboti fed these chiefs with her breast milk in a big pan of brass, which is still intact with Ktordofa, which was gifted by the queen. The queen gifted many other valuable things, which were carefully preserved by Reangs till date. Historical Population figures In 1971 the Riang were the second largest of the scheduled tribes in Tripura. There were 64,722 people counted in the Riang tribe in Tripura that year. In 1961 the Riang had numbered 56,597 and in 19 51 they had numbered 8,471. [1] According to the 2001 census, there were 165,103 Reang in Tripura. Meska and Molsoi groups The Reang clans are divided into two groups: 1. Meska, 2. Molsoi. The Meska Group The Meska group is divided into seven sub groups or dopha, these are as follows: 1. Meska :- â€Å"Meska†means the lemon tree in in kau bru language. 2. Msa :- â€Å"Msa† means tiger in Kau bru. It is said that the fore-father of this dopha was brought up by a tigress in his child hood like the Romulus and Ramous of ancient Rome. 3. Chorkhi :- â€Å"Chorkhi† means Spinning wheel in Kau bru, it is said that one Reang chief was speaking obscene about his daughter-in-law, when his friends started spinning the spinning wheel to musk the obscene of the chiefs. So the descendant are named after the chorkhi. 4. Raikchaoh :- â€Å"Rai† means cane in Kaubru, â€Å"kchaoh† means red in Kaubru; it is said that the fore-father of this dofa used to wear cane made red colour armlet. 5. wairem :- â€Å"wai† means tie, â€Å"rem† means mix/hybrid in Reanglanguage. It is said that they are descendant of Reang man and Kuki woman. 6. Tauma yakcho :- â€Å"Tauma† means hen, â€Å"yakcho† means toeless; the toes of the fore-fathers of this dopha resembled to that of hen. 7. Tuimuiyaphaoh :- â€Å"Tuimayaphaoh† means tortoise in Reang dialect, the fore-father of this dopha were suffering from white patches like the tortoise chest. The Molsoi Group The Molsoi group is sub-divided into six groups, which are as follows: 1. Molsoi :- â€Å"Molsoi† is the derivative of msoi which means msoi in Kaubru. Their fore-fathers first settled in the deer dominated green valley. Since they were called in that name. 2. Apeto :- â€Å"Apeto† is a type of fish in Kaubru. The fore-fathers’ belly was big like the belly of Apet fish. 3. Nouhkham :- â€Å"Nouh† means house, â€Å"kham† means burnt in Kaubru; once the fore-father of this dopha’s house were burnt to ashes since then they were termed in this name. 4. Chongpreng :- â€Å"Chongpreng† is a type of musical instrument, it is said that the fore-father of this dopha used to survive by playing this musical instrument as they were suffering from â€Å"gungri† disease. 5. Yaohstam :- â€Å"Yaohstam† means ring of finger, it is said that the fore-father of this dopha used to used to wear ring and used to display proudly to others. This dopha has been in extinct at present. 6. Reang kachko :- â€Å"Kachko† means chief in Kokborok, the fore-father of this dopha were chiefs of Reang. Ktor Dopha In the above thirteen dophas or sub-groups of the Reangs there are 26 chiefs or heads, who are designated as Kotor Dopha. Kotor means head and dopha means clan or group. The chiefs are divided into two categories: * Rai, and * Kaskau. Rai and his subordinates chiefs * Rai :- â€Å"Rai† means Raja or chief of the sub group is bestowed as Rai. * Chapiya Khan :- Crown Rai. * Chapiya :- Crown Chapiya Khan. * Dor kalim :- He is the priest of Rai. * Doloi :- Helper of Rai. * Bandari :- Store keeper of Rai. * Kanda :- Servant and holder of umbrella of Rai. * Doya Hajari:- Drum player. * Muriya :- Trumpet player. * Dugria :- Helper in of priest. * Dauwa :- Arranger of puja, or worshiping. Siakrak :- distributor of prasad, that is the sacrificial animal meat. Kaskau and his sub ordinate chiefs * Kaskau :- The chief minister of the sub-group is bestowed as Kaskau. * Yaksung :- He is the assistant of chief minister. * Hajra :- Servant of Kaskau. * Kangreng :- Umbrella holder of Kaskau. * Kormo : Servant of Yaksung. * Khan Galim: Umbrella holder of Yaksung. * Khandol :- The collector of food and other requir ed articles. People of Kotor Dopha are exempted from paying taxes to the king. Occupation, culture and custom The Reangs are primarily an agriculturist tribe. In the past they mostly used to practise the Huk or Jhum cultivation, like most other Tripuri tribes. But now shifted to modern agricultural practice. Most of the educated are employed in government job and many are occupying very high post in administration. Some have also started doing business also. Marriage system The Reang is an endogamous tribe and had very little contact with the Bengali or other sub-tribe of Tripuri. But since the beginning of nineteen century there has been some inter tribe marriages and inter-caste wedding among them. The marriage system is similar to other Tripuri tribe of Tripura. There is no dowry system but the bride-groom has to spend to father-in-law’s house for two years before marriage is performed. There are two types of marriages;but nowadays the system to spend to father-in-law’s house is no mandatory. Haloksai, and Haloksam. Parallel cousin marriage is prevalent but declining. Cross cousin marriage among the Reang is accidental. Child marriage is not allowed, widow marriage is permitted. Widows are prohibited to wear ornaments before one year is passed after the death of husbands. Widow and widower are forbidden to participate any entertaining and enjoying programme or activity or attending such activity within one year of death of their spouses. Remarriage of widow and widower are allowed after one year of death of the spouse. Monogamy is the present day practice of the society. Marriage is arranged through the matchmaker Andra, who goes to the prospective bride’s parent for negotiation. Then the brides party is invited to finalise the marriage in Kokswmgma, while pork, fowl, rice, rice beer are served. Marriage is settled to the satisfaction of both the party. The Okchai performs the wedding ceremony on the nuptial day fixed. The Reang widower is not permitted to get marry to an unmarried virgin girl. The Reang marriage bond is very strong and Reang men cannot divorce without the consent of wife. If any Reang is alleged for extramarital relationship and found to be true then they are dealt with strict punishment and heavy penalty is imposed upon. Dress and ornaments The traditional dress of the Reang is simple and plain like other Tripuri people. Traditionally the men wear a hand woven loin cloth and a piece of cloth as a wrapper for upper portion. The women wear a long cloth called Rnai, a wraparound; from the waist to down to the knees. A Rsa, covering the chest, and Rikatouh for covering the whole upper half of the body, wears the upper part of the body. These are woven by the Reang women, which are colourful and very beauty full. But nowadays the educated mass are wearing all the modern dresses like any other part of the world. The Reang women are very fond of personal decoration and take much care for the makeup and hair-do. They love like other Tripuri people, ornaments, flowers, and cosmetics. Silver ornaments especially the necklace of silver coins, the Rangbauk have a pride of place and status. Dance and music It is very much integral part of the Reangs daily life. No other Tripuri people are so fond of dance like them. As a result the Hojagiri folk dance of Riang sub tribe had attained achieved acclaim all over the world. Hozagiri Dance is the most famous dance of the reang community. While the theme of the dance remains almost to be the same as of other tribes, the dance form of the Reang community is quite different from others. The movement of hands or even the upper part of the body is somewhat restricted, whereas the movement beginning from their waist down to their feet creates a wonderful wave. Standing on an earthen pitcher with a bottle on the head and a lighted lamp on it, when the Reang belle dance twisting rhythmically the lower part of the body, the dance bewilders the onlookers. The Reangs also use the musical Instruments like Khamb, Flute made of bamboo and bamboo cymbal. The Reang women prefer to put on black Pachra and Rsa. Reang women put on coins ring, which generally covers their entire upper body. They also put on rings made of coin in their ears. They are fond of fragrant flowers as ornaments to metal things Customs Most of the disputed and differences are settled by the people of Kotor dofa, that is by the Rai and Kasko of respective sub tribe. It is done through the customary law of the Reangs. Whenever a disputes arise in the between the member of the community, a meeting is called by the Rai. All relevant arguments are heard and then justice is done according to the principle of natural justice. Whatever verdict or punishment is pronounced in the judgment it is implemented with firm hand and payments of penalty etc. re made then and there. Religious belief and practices Majority of the Reang in Tripura adhere to Vaishnav Hinduism. They claim Kshatriya status. A growing number of Christians, almost all of them Baptists, exists in both Tripura and Mizoram. In 1943, the Reang were subjected to forcible conversions during the rebellion by Ratanmani Noatia. During the end of 2 0th century, they were again subjected to religious violence in Mizoram by the Baptists. [3] Like other Tripuri people they also believe in many god and goddess. The centre figures are those of fourteen gods and goddess of Tripura. Their important festivals are same those of prevailing in Tripura. These are Ker, Gonga mwtai, Goria, Chitragupra, Hojagiri, Katangi puja, Lampra uathop. The religious observance are community in nature, and each family has to contribute his part of share of payment. It is called as Khain. All the religious festivals are arranged with the prior meeting of chiefs. In such meetings political, social, and religious matters of importance are discussed and decided by the majority of the meeting. The deities of the Reangs are similar those of other Tripuri people. These are: * Sibrai’, the supreme deity or Mtai Ktor Tuima, the presiding deity of river, * Mainouhma, the goddess of paddy, * Khuluhma, the goddess of cotton, * Goroia, the god of wealth prosperity well being and war, * Kalaia, brother of Goria, * Sangrongma, the deity of mother earth, * Hathaikchuma, the goddess of hill, * Buraha, the god of jungle, * Thuhnairou, the god of death, * Bonirou, the god of evil spirit, * Nou hsuma, the goddess of house holds. Worshipping of the deities The worship of different deities are similar to the main-stream Tripuri people. Aokchai, the priest performs all the ceremony along with his helper. The green bamboo pole is used as deity in most on the cases. Different types of life stock like fowl, pig, goat eggs, etc. are offered in the worship. The place of worship is selected out side of the houses. Where the offerings are dedicated in the names of the deities in front of the wathop, green bamboo pole, the symbol of god. But the Rangtouk and Nouhsuma puja is held inside the house only. Two earthen pots are filled with newly grown rice and at top of the pot some oval pebbles collected from huk specially. The pebbles are called the fortune stone. And the pots (Rongtuk) are decorated with the rice powder, vermilion, and garlands. One is named Mainouhgma, the other as Khuluhgma. Rituals on birth of a baby On the birth of baby many pujas are observed. These are Kebengma, Abu suma, Khongkhonok kama, Maitukma etc. for the welfare of the baby. The fowl, prawn, several leaves of trees are needed. When the child grows up special form of worship has to be performed. Bukhuksini the seven-gurdian deities of witches are pleased with sacrifice of a pig, four fowls, and other things beside. Ceremony on death The mortal remains are cremated. The obsequies is done in two stages: Broksakami and Kthuinaimo. Broksakami When a person dies his corpse is first bathed with the Chobtui that is â€Å"alkali water or soap† . After that he is dressed with new clean Rikatouh, head is dressed with another piece of rikatouh like the headgear. In case of woman rnai and rsa. Then a fowl is sacrificed in front of the feet of the corpse. Later on an earthen pot filled with mean and rice placed at the feat of the deceased and it is followed by dance rituals throughout the night. Rice bear is distributed to all the mourners excepting the family members of the deceased. The next morning the body is laid to rest on pyre and cremated usually near a stream. Kthoinaimo It is a ritual connected with the respectful and well wishing offering to the manes. Laotou or the soul deceased remains under the control of the Sisimangi, the son of Buraha , for a year and it is said that Sisimangi is the protector of the soul. On the day of the kathainaimi the widow of the deceased offers dried rice, meat, fish, fruits, and wine in the name of Laotau and Sisimangi, on the smangnouk , then taking the burnt bones or ashes go to the charainok. It is worshiped for over a period of one year or he next hangrai, when it is immersed in any river or in Gomati River at Dumbur,or Ganga, according to the ability of the family. In short the religious culture of the Reang is similar to that of other Tripuri or the Tripura’s other cast Hindu . Posted by BRU at 04:37 Email ThisBlogThis! Share to TwitterShare to Facebook No comments: Post a Comment Newer Post Home Subscribe to: Post Comments (Atom) Followers Blog Archive * ? 2011 (20) * ; December (6) * ; November (12) * ? October (2) * HISTORICAL BACKGROUND OF TRIPURA * Demography of Reang’s History About Me BRU View my complete profile | | Simple template. Powered by Blogger.

Friday, September 27, 2019

PDA SIM Essay Example | Topics and Well Written Essays - 750 words

PDA SIM - Essay Example Determining a product’s lifecycle can enable a manager to make decisions of whether to invest more in a project or discontinue an operation. The three products HandHeld Corporation offers are X5, X6, and X7 devices. I noticed that the X7 product had weak sales. As a new CEO working for this business I seek out the advice of my top executives. Teamwork and cooperation are variables that improve the corporate culture and help firms achieve synergy. Synergy is achieved when the whole becomes more important than the sum of its parts (Schermerhorn & Osborn, Hunt, 2003, p.173). My top advisor indicated that the X7 product was in its growth stage. At that point I decided that discontinuing the product was not the right move because investing more in R&D could help increase the demand for the product. I noticed that the market saturation of the product in the first year was only 3%. The X7 product line had negative profitability. The company lost nearly $8.5 million on the X7 this year. The costs were higher than the revenues. I wanted to increase the price by 25% to offset the -17% profitability deficiency, but since the customer care about price I decided to go another direction. The problem with the product was the existence of a high fixed cost of $35 million. If I was able to sell more units then I would have more total profits to offset fixed cost. I lowered the price of the product by 10%. I allocated 50% of the R&D budget to the X7 because it had the lowest market saturation out of the three products. The X5 which was the most saturated product received 20% of the R&D budget and the X6 received the remaining 30%. I increased the price of the X6 hand device by $25 because the customer’s are not worried about price. I decreased the price of the X5 by $25 in order to increase its demand. My score after round 1 was completed was a score of 558,204,736. The 2006 profits were $347,929,621. I was able to turn the X7 into a profitable

Thursday, September 26, 2019

Summary 1 Essay Example | Topics and Well Written Essays - 1000 words - 2

Summary 1 - Essay Example At the moment, the restaurant has 9 employees perceived as being loyal. The restaurant has adopted a simple design and purpose. The buffet set-up comprises of numerous dining tables in addition to a big steam table. A family style of service is adopted where customers serve from bowls and plates. In the kitchen, meat would be flame grilled and deep fryers would be used for fried foods. The restaurant seeks to offer quality food at reasonable prices to its clients, combined with exemplary service, so as to make its profits. Looking at the physical structure, the restaurant, measuring 3,000 ft2 and constructed on an acre of land, is built of vinyl siding. The window trim is made of wooden shingle. The location is in proximity to a mega shopping area which has stores like Wal-Mart, McDonalds, Kroger and the ancient Eugene Mall. This area is under frequent patrol by policemen thus making it a low-crime area with no criminal activity having been reported from any store. Even more, the interesting lighting in the area boosts security. The ceiling has small lighting fixtures and back-up lighting which operates independent of generators. Street lights erected between shrubbery hedging surround the parking lot of the building with a spotlight which remains switched on throughout, shining on the front of the building. The store has several exit and entry doors; there is one exit/entry on the side, another at the front and yet another in the kitchen area. An alarm has been installed and it goes off when the back door, reserved for employees, opens. A concrete brick wall surrounds the courtyard accessed through the side exit. A counter blocks off a drive-up window and a door, these having been present since the building was bought, creating a room for serving supplies. In the same area, a cash register will be found. This location secures the cash register and supplements security from indoor surveillance. The store has three surveillance cameras which capture

Video response on training day Essay Example | Topics and Well Written Essays - 500 words

Video response on training day - Essay Example cer does.† Alonzo does not manifest respect for the law and justifies his unethical behavior by stating â€Å"police can do whatever they want.† Alonzo manifest minimal obligation to the constitution since the laws derives from the constitution, which is the supreme law. The paper explores the film relative to the ethical framework of relativism and legal moralism. Ethical relativism infers the theory that asserts that morality is relative to the norms of one’s culture, meaning that whether an action is right or wrong hinges on the prevailing moral norms within the society (Banks, 2004). The definition of Alonzo’s concept of Street Justice takes the view that is not worth dealing with petty crimes, which entail drug sales and crack addicts. He continues that, his mandate entail dealing with the â€Å"big fish† rather than the â€Å"maggots on the street.† In line with this observation, street justice represents a brand of outlaw behavior embodying taking the law into a person’s own hands, whether the decision arise out of frustration, madness, rage, or an authentic belief that this is the right thing to do (Banks, 2004). Defenders of legal moralism assert that governments also manifest an unchained right to enforce harmless immoralities. Nevertheless, all governments can utilize their coercive power to prevent individuals from engaging in diverse harmless activities that perceived as immoral. It is evident in the film that Alonzo values the informal norms of his department that sanction corruption, street justice, and police misconduct. Alonzo is of the view that his decisions are supreme that he can be the law (Pollock, 2010). Street justice is linked to handling deviant behavior by circumventing the provisions dictated by the criminal justice system, whereby justice viewed as swift and the punishment rendered suits the crime committed. As such, revenge is frequently related to this concept; instead of depending on the police and the government/federal

Wednesday, September 25, 2019

Effective team and performance management Essay - 1

Effective team and performance management - Essay Example Enhanced performance and effectiveness cannot be achieved through external pressure but through trust. Cohesiveness does not necessarily imply a harmonious group as members may be cohesive simply to abide by the team norms which become the rules. Flexibility and empowerment are essential requirements for team effectiveness. Team players may be entrusted with multiple roles but this only creates an air of hostility. The involvement of senior management is essential to achieve team effectiveness. 2.0 Introduction Electron, headquartered in the UK, manufactures components for the telecommunications sector. The company employs about 150 people out of which 90 people are in the manufacturing unit. The company has the traditional department structure comprising of manufacturing, engineering, sales/marketing, human resources, and finance. The manufacturing department at Electron is made up of eight teams in total, each are named according to a colour. Each team consists of 10 team members, with some on temporary contracts, whilst others are full-time employees. The company recognized the importance of an effective production process, of improving company culture, of improving customer service and commitment to teams. Amidst competition the company employed new workers and these workers have to be integrated into one of the teams. Thus, there are three teams at play – the longer-tenured teams, the existing teams and the new workers. However, the teams at Electron have not been demonstrating shared vision and autonomy. The aim of this report is to evaluate the barriers to team effectiveness and performance. Based on the theoretical models, this report also seeks to recommend how teams at Electron could be made more effective and performance enhanced. This report would not define ‘teams’ but would directly evaluate team dynamics. 3.0 Analysis and Discussion 3.1 Theories and concept of team dynamics The nature of teams has undergone a change and the th ree most impactful themes that are affecting teams are dynamic composition, technology and distance, and empowerment and delayering (Tannenbaum, Mathieu, Salas and Cohen, 2012). The changed business environment has also altered the team needs. Trust and cohesion have become difficult to achieve in teams and moreover, individuals may simultaneously be members of several teams. They may even change team roles frequently, all of which suggest the dynamic composition of teams. Team dynamics have enabled dyadic network of relations and exchanges between members. At Electron also, team dynamics were at play. One team member was entrusted to integrate the new workers into the team. This team member entrusted the longer-tenured members with this task. The team members were empowered but without proper guidance and training. If teams do not demonstrate interdependence, shared objectives, autonomy, reflexivity, boundedness, and specified roles, then they are â€Å"pseudo teams† (West a nd Lyubovnikova, 2012). If real and pseudo teams could be identified within an organization, it would become easier to evaluate team effectiveness and performance. Without this identification and even team empowerment could have

Tuesday, September 24, 2019

Travelogue Essay Example | Topics and Well Written Essays - 250 words

Travelogue - Essay Example He came back to Bangladesh in 1972 when it was struggling to liberate from Pakistan. This was the time when he wanted to make a difference and became very active in the said struggle. He was part of the planning commission in charge of planning the economy. It was very remarkable to note that even with what he has achieved in life, he was passionate to help those poor people in Bangladesh to lift up their lives out of poverty. He thought of steps and possible strategies as solutions to this problem. According to Yunus, teaching well-designed economics strategies to his students were ineffectual when you see hungry people everywhere, old and young people looking alike. This was when microcredit system was born. Yunus believed that microcredit system was the optimal answer to fight poverty. The microcredit strategy includes providing credit to the poor without involving any collateral. He wanted to learn the realities of being poor and his experience in Jobra helped him realize that tiny loans offered to people for self-employment was one of the successful ways. Grameen Bank was born and this has started the economic revolution. Unlike the conventional banking system, Grameen bank does not require any collateral and extends their loans to those who are considered to be the poorest. The bank also focuses on women borrowers. To be able to make a loan, a villager must prove that her family owns not more than one half acre of land. This system was way considered unusual. For someone to start this kind of system and exert efforts to help without any security, Yunus is really an exceptional human being with so much passion to help the poor. This microcredit system is therefore mainly based on mutual trust. This very successful strategy that started with 42 people was due to the person who has a heart to make people very happy with small amount of money. As per Yunus after he has started to lend money to the poor, the only question in his mind was â€Å"How do I do

Monday, September 23, 2019

Improving Construction Safety in Saudi Arabia Dissertation

Improving Construction Safety in Saudi Arabia - Dissertation Example 1 Introduction It is rather unfortunate, but true, that the construction industry around the world had developed a reputation for being the industrial sector that presents higher statistics for industrial accidents, fatalities and deaths than any other (Coble, 2000, Pp. vii - viii). United States Department of Labour for the year 2006 indicated that construction fatalities represented about 21% of the total work force fatalities (Lambeck, 2009, Pp. 72 – 74). However, efforts directed towards continuous improvement in construction safety in many countries, including Japan, South Korea, China, etc. demonstrate that it is possible to reduce the incidence of occupational injury, serious accidents or deaths (Poon, 2008, Chapter 1). Statistics for construction industry accident frequency rates per million of men hour worked for Singapore suggest that with an accident frequency rate per million man hours of 3.5 for the construction sector in comparison to 1.9 for all other industries help to illustrate the notoriety of the construction sector (Poon, 2008, Chapter 1). However, results for Japan, Korea and Hong Kong demonstrate improvement with effort. Reports about the construction sector in Saudi Arabia suggest that it is possible to do more to bring about an improvement in health and safety for those working in the construction sector (Al Omani, 2008, â€Å"Does Saudi Arabia need a health and safety boot?†), (Migrant Rights, 2011, â€Å"FAQ†) and (Construction Week, 2010, â€Å"Construction sector must embrace safety culture†). Like in any other industry, accidents in construction lead to injury, possible loss of life, additional work and added costs (Li Wai Chung, 2006, Chapter 3). Time losses for the injured, delays in completion of construction, medical expenses, damage to... The intention of this study is the term ‘safety’, which refers to an absence of danger, as often partnered with the term ‘health’ within the context of work in general and for construction work. Because human health and welfare are of concern to the society, a corporate responsibility exists to ensure that minimal risks exist to the health and safety of employees so that individuals, families and the society at large receives protection and remains free from catastrophe. Thus, the legal system in England and in many other nations emphasises a duty to care, an absence of negligence and criminal responsibility for injury to ensure that those who use employees for business do so in a manner that will minimise harm to these individuals, especially when the business motive is to present profits. The law reflects values in a society and without values that emphasise health and safety it is likely that the risks associated with occupations will present undue harm t o individual members of a society and to society itself. Hence, a global concern exists for health and safety in construction and many nations around the world have enacted laws and regulations to emphasise health and safety in occupations, based on recommendations of international organisations, including the International Labour Organisation (ILO) and national values. However, a need exists to ensure that laws and regulations are effective and practical.

Sunday, September 22, 2019

Naming the Minerals Essay Example for Free

Naming the Minerals Essay Name the minerals below. Then, insert a percentage of how certain you are in your identification. Finally, explain your percentage of certainty: What was confusing about this mineral? What other minerals do you think it could be? Remember, the minerals in the virtual lab include seven of the following: borax, calcite, corundum, graphite, gypsum, orthoclase feldspar, pyrite, quartz, talc, and topaz. Identification of Mineral Percent Certain Explanation of Certainty Example: Fluorite 80% certain I am almost certain this mineral is fluorite, but I am not completely sure. Fluorite and gypsum are both white, shiny, have white streaks, cleave, and show no reaction to acid. However, the specific gravity of this mineral is 3.18, which is higher than gypsum, so I am pretty sure it is fluorite. Mineral 1: Pyrite 80% certain I am almost sure that this mineral is pyrite because it is gold and has a black streak. The only thinks that do not match up is the specific gravity and the hardness. Mineral 2: Talc 100% certain I am certain that this mineral is talc because the hardness, specific gravity, color, streak and acid reaction are all the same. I am almost sure that this mineral is pyrite because it is gold and has a black streak. The only thinks that do not match up is the specific gravity and the hardness.. Mineral 3:Calcite 100% certain I am certain that this mineral is calcite because it is the only mineral on the list that is white and had an active bubbling acid affect. Mineral 4: Orthoclase Feldspar 90% certain I am almost certain that this mineral is orthoclase feldspar because everything matches but the hardness. The only other mineral it could be is corundum and the hardness is nine and I feel that that is way too high to be my mineral. My mineral matches best with orthoclase feldspar. Mineral 5:Quartz 100% certain I am almost certain that this mineral is quartz because it completely matches the description. Mineral 6: Gypsum 100% certain I am certain that this mineral is gypsum because the color, specific gravity, hardness, streak, luster and cleavage all match up to gypsum Mineral 7:Graphite 90% certain I am almost certain that this mineral is graphite. The only thing that does not match up is the acid reaction. When I ran the test I did not see any reaction with the acid but graphite does react to acid. I did not see any other options because the mineral is black and the streak is brown. So I am almost positive that the mineral is graphite. Part 3: Summary Write a summary answering the following: What are the four requirements for a material to be classified as a mineral? How do you differentiate between minerals? Briefly summarize the six methods to tell minerals apart. Summarize the major differences between minerals and rocks. For a solid to be classified as a mineral it must meet these four requirements: naturally solid, formed by inorganic processes, have characteristics of crystal structure, and a specific chemical composition. In order to tell minerals apart you can use these six methods: luster or color, streak, specific gravity, cleavage fracture, hardness, and acidity. Luster is the intensity that light reflects off of a mineral. A mineral may be shiny, pearly, or even metallic. Some minerals may be distinguishable by their color. By dragging a mineral across a streak plate its mineral powder will leave a streak with a particular color, but this is not a very reliable way of identifying a mineral. By dividing the weight of a mineral in water by the weight of the water you can get the specific gravity of a mineral. Another method is by determining if the mineral has cleavage or fracture. When broken a rock will either be in rounded chunks, fractured, or it be flat with corners, cleavage. Using the M oh’s Hardness Scale you can determine minerals hardness. Hydrochloric acid placed on a mineral will determine whether a mineral contains calcium carbonate. The difference between minerals and rock is that rocks are aggregates. This means a collection of minerals that intergroup together; sometimes many kinds in one rock.

Saturday, September 21, 2019

Security Policy ATM

Security Policy ATM The purpose of this document is to define a security policy for Bank H. This policy covers. This comprehensive policy is intended to cover all aspects of information security relating to Bank H ATM machines including: installation, maintenance, and operation ATM machines and network, employee responsibilities, ramifications for customers, and the security of ATM transactions. This document is divided into three sections, each covering a key facet of information security: Organizational Policy Issue-Specific Policy System Specific Policy Organizational Policy Information security is a prime concern at Bank H. much of our information is critical in nature and must be protected not only for our own sake, but for our customers and to comply with government regulations. This makes it the responsibility of every employee of Bank H to comply with the policies established in these policies. Program Responsibility The Chief Information Security Officer has the prime responsibility for establishing and enforcing the procedures necessary for the protection of information. This person reports directly to the Chief Executive Officer and Board of Directors. A security oversight committee will also be formed consisting of the Chief Information Officer, Chief Financial Office, Chief Information Security Officer and other representatives as seen fit. This committee will meet at least quarterly to review security procedures and recommend appropriate updates. The Chief Information Security Office will be responsible for the establishment, implementation, and enforcement of information security policies on a day to day basis. Enforcement All employees of Bank H are required to adhere to the policies contained in this document. Any infringements of this policy will result in disciplinary action up to an including termination and legal action. Each employee will be required to review and sign a document indicating that he or she has reviewed and understood these policies upon hire and as part of the annual employee review process. Any employee who suspects a breach of these policies is required to immediately report the breach to his or her direct supervisor. If that is not possible, then the employee may contact the office of the Chief Information Security Officer directly. Failure to report breaches may result in disciplinary action as specified under these policies. Government Regulations The mandate for a comprehensive information security policy comes from many sources. Of foremost importance is Bank Hs concern for it employees, customers, and information assets. Additionally, due diligence is required by many overseeing government agencies. Title 12, chapter II of the Code of Federal Regulations from the Federal Reserve Board defines security policies that must be followed by banks to ensure compliance with the Bank Secrecy Act and the Bank Security Act (Regulation H: Membership of State Banking Institutions in the Federal Reserve System). Part 326 of the Federal Deposit Insurance Corporation also details minimum security requirements for banks including: Designation of a security officer Implementation of a security program Annual reporting requirements (Part 326—Minimum Security Devices and Procedures and Bank Secrecy Act) Therefore, a main goal of this document is to establish and define a security program that meets the requirements of these and other regulatory agencies. Issue-Specific Policy The key issues that arise when considering our overall information security plan involve protecting our customers, employees, and assets. Three additional issues that must be considered are risk management, disaster recovery, and training, which all work together to support our overall goals for establishing these policies. Protecting Our Customers Whereas ATM machines provide a valuable service to our customers, it is incumbent upon Bank H to take all reasonable steps to insure the security and safety of their assets, personal information, and physical security while they are conducting transactions at a Bank H ATM machine. Regulations in the USA Patriot Act place specific requirements on banks regarding the information that customers must provide in order to open and account (Office of Thrift Supervision Staff Summary of USA Patriot Act.). Furthermore, the Sarbanes-Oxley Act of 2002 places certain legal requirements on Bank H regarding the protection of sensitive information customer information (Public Law 107-204 107th Congress). Procedures below will detail necessary practices for protecting our customers including: ATM location and physical environment Authentication and verification of identity Protection of private customer information Protecting Our Employees In a real sense, establishing good security policies will protect our employees and help to insulate them from the daily risks of dealing high volumes of money and sensitive information. By clearly outlining security policies and procedures, all employees will have clear guidelines to follow to protect themselves and the assets they come into contact with. Clearly defined control procedures protect both our assets and our employees from accidental or intentional loss. A clearly defined security policy also establishes a legal standard of informed consent which is a judicial requirement that has been established by legal precedent. This document will establish procedures specific to our employees and their interactions with ATMs including: Contact with sensitive information Contact with money and other cash instruments Access to ATM equipment Protecting Our Assets Information, like money, is a valuable asset that must be protected from theft, destruction, and unauthorized access. ATMs represent a unique exposure to risk since they are often installed in locations that are outside the physical perimeter of the banks facilities. Extra precautions must be taken to protect external ATMs and ATMS located at other facilities since they will often be unattended. This policy will establish procedures to protect ATMs including: ATM Locations Environmental guidelines Minimum hardware security issues Data transmission, storage and encryption Risk Management Risk management is one of the first lines of defense in the effort to protect our customers, employees, and assets. Although the details of risk management fall outside the scope of this document, basic risk protection guidelines will be established by the Security Oversight Commission and a senior representative from risk management will be on that committee. In general, it is important that all reasonable steps will be taken to insure the company and customer assets including: FDIC insurance covering customer deposits Applicable insurance to protect ATM equipment Applicable liability coverage Disaster Recovery The ability to recover from natural and man-made disasters is an essential component of any security program. It is not the intent of the policy to create a comprehensive disaster recovery plan for the company. However, issues related to disaster recovery will be covered as applicable to ATMs including: Recovery of information and assets from equipment involved in an accident or disaster that renders the equipment inaccessible or damages or destroys the equipment Planning to mitigate the loss caused by such events Restoration of service, where applicable Training and Awareness All employees are required to attend security awareness training sessions to be coordinated and conducted by the Chief Information Security Officer a minimum of once a year. These sessions will be designed to educate employees of their responsibilities. Topics will include: Education on new and existing policies and procedures Practical training on tools and technology Awareness training on risks and mitigation System Specific Policy Special consideration must be used in protecting the systems that support our ATMs and data networks. As technology changes, so will the challenges and tools available for the security of these systems. Therefore, these policies should be reviewed on a quarterly basis and updated as necessary. ATM Machines ATMs form the core systems covered by these policies. Since many ATMs are outside the physical protection of our facilities, special care must be taken to protect them. Policies must be implemented to deal with these unique systems including: Money control procedures Technology to monitor ATMs against tampering and abuse Best-practices for installation and maintenance of ATMs Networks Data networks are necessary components of an ATM system and in some cases the most vulnerable. Therefore, all due care must be taken to insure the integrity, reliability, and security of our networks. Policies must be established regarding: Network installation and maintenance Network monitoring Network protocols and standards The use of encryption Section 2 Security Systems As the field of information security has matured, several recognized standards have evolved. Following these standards help to insure the development of comprehensive and effective security policies. A key concept in information protection is the concept of security systems. Security systems are domains of protection that establish the best practices. Our policies will be developed to cover each of these domains as appropriate. Confidentiality Confidentiality protects information from disclosure or exposure to unauthorized agents. Confidential information must be clearly indentified and reasonable steps must be taken to maintain its confidentiality. The following policies relate to confidentiality in the context of Bank H ATM security: Information will be classification so that confidential information can be identified and protected. Measures will be taken to protect confidential information in both physical and electronic form. The confidentiality of customer information is of prime importance. The confidentiality of personal employee information will also be protected. Integrity Integrity insures that information is kept in its original state and does not become corrupted at any point in the system. Systems must be implemented to protect assets from both intentional and unintentional corruption. The following policies relate to integrity in the context of Bank H ATM security: Error-checking data protocols will be used to insure the integrity of information in electronic form. Proper control procedures will be used in the handling and transport of information in physical media. Backup and archival policies will be constructed so that information may be re-created in the event of loss. All hardware and software will be maintained to insure the highest level of integrity when working with our data. Availability In order to be useful, assets must be available to those authorized to access. Some security risks are designed to block access to information and other assets. Policies that support availability include: Systems connected to external networks will have software and hardware to protect them against denial of service attacks. Disaster recovery plans will be developed and tested to insure the quick recovery of operations in the event of a disaster. ATMs will be located in areas that are accessible and convenient while appropriate measures are taken to secure them. Access control One of the first lines of defense is to limit access to an asset to authorized personnel only. This starts with locking the door and may include other devices and techniques to control access. Examples of access control include: Locked areas will be used as appropriate and policies will be developed to manage keys and access codes. The use of automated access cards or key-code locks will be used as appropriate to limit access to authorized personnel. The use of usernames, passwords, and other methods will be used to limit computer system access. Keys, codes, and other information relating to access to ATMs will be closely managed. Non-repudiation Accountability is the final key to a good security system. A clear and authentic trail of ownership and access to information and other assets must be established and maintained at all times. Examples of policies designed to enforce non-repudiation are: Fingerprints will be used to irrefutabley identify parties, as appropriate, when dealing with information in physical media. Digital certificates and digital signatures will be used to add irrefutable identification to electronic information as appropriate. Section 3 Standards The following standards have been established as minimum set of requrements that must be met in order to insure our security and protection of our assets. Compliance with these standards in mandatory at all levels. Any exceptions must be cleared in writing by the Chief Information Security Officer with the agreement of the Security Oversight Committee. Employees Before hire, all employees will sign a release document authorizing the company to perform or contract with a third party to perform a background investigation. Employees will be required to present a verified set of fingerprints which will be sent to appropriate law enforcement agencies for a criminal background check. Potential candidates who do not pass such background checks or fail to submit to them will not be considered for employment. All employees, upon hire, will be required to review and sign the following documents: A non-disclosure agreement stating that they will not disclose company information to third parties. An information confidentiality policy describing the banks information classification system and the handling of information at each level. A privacy statement informing the employee that their personal information will be held as company confidential and will not be released to third parties except as required by law. An accepted use of company resourced policy which clearly explains that all company equipment and resources, including information and service, are wholly owned by Bank H. Employees may not use any company equipment or resources for personal use. Upon hire, each employee will be issued a photo id card. This card must be displayed at all times while on company premises. When an employee leaves the company for any reason, the following procedures are to be followed: Whether the termination was for voluntary or involuntary reasons, employees will not be allowed to stay on the premises. The standard 2 week notice will be foregone and the employee will be expected to depart the premises on the same day. Any compensation due will be determined by human resource policy. Before leaving the premises, employees will conduct an exit interview. During this time the employee will reveal or return any access instruments that are outstanding in their file. Access to all computer systems or any other system that was granted to the employee will be immediately removed. Customers A valid government ID and social security card must be presented by all bank customers before an account of any kind can be opened. Copies of these documents will be made and kept on file in a secure manner. Potential customers must be cleared using industry appropriate services to insure that they are free and clear form obligations to other financial institutions before they will be allowed to establish and account. Each customer will be issued a secret Personal Identification Number (PIN) at the time they open an account. The PIN must be created using a system either randomly generates a PIN that is only known to the customer or allows the customer to enter the PIN without the revealing it to the bank employees. PINs will be immediately encrypted. At not time will a PIN be stored or transmitted in an unencrypted form. ATM cards will clearly show the full name of the customer, their card number, and a clear expiration date. ATM cards and any corresponding PIN shall not be mailed or otherwise transmitted within the same document or package. Upon closing their account, customers will return any ATM Cards in their possession. All ATM cards will be immediately disabled. Customers will be required to read and sign a document that explains their obligations for ensuring the security of their ATM cards and transactions. At a minimum, customers must agree to: Take reasonable steps to ensure that the ATM card issued to them is kept secure Notify the bank as soon as they believe that an ATM card has been lost or stolen Not let anyone else user their ATM card Not reveal their PIN to anyone else Notify the bank if their PIN has become compromised. Non customers wishing to conduct business with the bank will be required to show a valid government issued ID and must leave a fingerprint on file, preferably on the document being transacted. Employee and customer areas will be clearly marked. Customer will not be allowed in employee areas. Physical Security All company facilities shall be secured, at a minimum by doors with manual locks. Doors shall remain locked during non-business hours and at any time the facility is not occupied. A log must be kept of keys, the number of copies that have been made, and who the keys have been distributed to. Records must also be kept of keys that are reported as lost and who was reported to be in possession of the key at the time it was lost. A log must be kept of electronic codes and door access cards including who such instruments have been distributed to. Records must also be kept of access cards that are reported as lost and who was reported to be in possession of the key at the time it was lost. Employees must notify security as soon as they believe that a key, access card, or lock access code has been compromised. All bank facilities that hold money and similar must be secured by an alarm system. Employees should have the ability to trigger such alarms without detection. All ATMs must be secured with alarm systems that are triggered by unauthorized tampering. All alarm systems must be tied directly to local authorities or a registered alarm service that monitors the alarm status at all times. Monetary Access Appropriate control procedures and accounting procedures must be adhered to when dealing with money. Any area in which money is handled, held, or transported must be under constant video surveillance. Any monetary transactions exceeding $1000 must be verified and witness by a second employee. Any monetary transactions exceeding $10000 must be continuously observed by an employee who is at a higher level than the employee completing the transaction. The transport of money outside the bank facility must be handled by an authorized armored transport service and escorted by qualified armed personnel. Information Classification All information, whether in physical or electronic form, shall be assigned an appropriate level of classification based on its sensitivity and criticality. Data shall be assigned a minimum of three levels of classification. Public this information is neither sensitive nor critical to the company, nor is there any legal requirement to protect it. Confidential this is information that is sensitive in nature and should not be reveled to the general public. This classification is further subdivided into two categories: Company Confidential this information is sensitive information related to bank. Customer Confidential this is private information that belongs to a customer and must be protected by law. Critical information that is not necessarily (but may be) confidential, but is nevertheless critical to the successful functioning of the bank. ATM Equipment ATMs that require external access must still be secured in such a way that any access panels are not visible and cannot be easily accessed. All ATM machines must be under constant video surveillance. All networks shall be protected by a hardware-based firewall and other hardware and software deemed appropriate. The banks internal network shall not be exposed to public networks such as the Internet. All data transmitted via a network must be encrypted to prevent exposure to unauthorized tapping. Data protocols must be in place to validate that data is both transmitted and received in its original form. Data that does not pass validation should be rejected and logged. Network security software must be installed that constantly monitors the network for patterns and signs of attempted or actual unauthorized access. Activity that represents a threat must trigger an alarm to appropriate agencies and personnel. The daily stocking and removal of cash to and from an ATM shall be done in adherence to policies in section regarding the handling of cash detailed above. Each ATM shall use a PIN encryption device that encrypts and stores the information in a secure manner. Hardware must be implemented monitor, analyze, and authenticate any external source attempting to connect to the ATM. Unauthorized attempts must be logged and reported immediately to the monitoring agency. ATMs shall be connected to a monitoring system that automatically tracks the status of the ATM. The ATM should be configured with software that can log and securely transmit information about usage for external profiling to detect potential attacks. All ATMs must be under continual video surveillance as detailed in section 2.3 above. At no time will the customers PIN, account number, or other confidential information be displayed on the screen or any receipt. Networks All networks shall be protected by a hardware-based firewall and other hardware and software deemed appropriate. All data transmitted via a network must be encrypted to prevent exposure to unauthorized tapping. Section 4 Practices, Procedures and Guidelines This section defines the practices and procedures for the day to day operations of the company. These represent a set of guidelines which allow managers to perform their duties with due diligence, while also offering flexibility and adaptability for various environments and situations. Any questions about interpretation should be addressed the office of the Chief Information Security Officer. Employees Employees may, as appropriate, be issued certain instruments or information that allows them to access restricted areas or information. Upon receipt of any such instrument, the employee will sign a document verifying their receipt and agreeing to release the instrument back to the company when their job no longer requires it or upon termination. Instruments of this nature include, but are not limited to: ID Cards Access cards Access codes including usernames, passwords, Pins, and codes to electronic locks. Keys Customers Customers should read and sign a privacy notice informing them that their personal and financial information will be protected and not revealed to any third party except where required by law. Customers should be given a pamphlet that explains how to safely and securely use their ATM card online and at ATM machines. Physical Security The same procedures detailed in section 3.3 should be implemented for padlocks or other portable locking devices and keys to them. Doors that required access by more than 5 people should be considered for electronic access. Security officers should be present at all facilities that hold money and similar instruments during business hours. After hours, arrangements for surveillance and patrol should be implemented as appropriate. Prominent security cameras should be located both inside and outside all facilities that hold money or related instruments. These cameras should be linked to a system that records their images at all times. Computer Access In general, computers used for bank business should not be connected to the Internet. Computers that require connection to the Internet should not also be connected to the Banks internal network. Software that monitors and controls Internet activity should be used on computers connected to the Internet. The following guidelines should be used for password security: Passwords should be changed at a minimum of every 30 days. Passwords should not be reused. Passwords should contain a minimum of one number and one character and must be at least eight characters in length. Monetary Access Appropriate control procedures and accounting procedures must be adhered to when dealing with money. Any area in which money is handled, held, or transported must be under constant video surveillance. Any monetary transactions exceeding $1000 must be verified and witness by a second employee. Any monetary transactions exceeding $10000 must be continuously observed by an employee who is at a higher level than the employee completing the transaction. The transport of money outside the bank facility must be handled by an authorized armored transport service and escorted by qualified armed personnel. Information Classification Additional levels of information classification may be assigned as appropriate. All information that is considered confidential should be clearly labeled as such. Electronic confidential information should be stored in an encrypted form at all times. Physical media that is confidential should be secured in a locked location at all times. Information that is critical should be backed up an archived on a regular basis. ATM Equipment ATMs should be located inside of an existing bank facility when possible. ATMs should be installed in a well-lit area with open access. Keys and other devices that allow access to ATMs must be kept under tight security and are subject to regulations specified under section ATMs should be installed by authorized vendors who have been screened and are bonded. Records of all persons involved in the installation will be kept and archived. All vendors should supply documentation showing that the persons performing the installation have successfully passed a background check including a criminal background investigation. A schedule of preventive maintenance should be created to insure the correct functioning of all ATMs. Maintenance shall be performed only by qualified individuals. Records of maintenance should be kept including the date of the maintenance, what was done, and who performed the maintenance. These records shall be considered company confidential. Systems should be in place to prevent the tampering of ATMs or tampering with their information. ATMs should incorporate and audible alarm that is triggered by any sign of trouble. The ATMs internal software should be capable of sending alarms to the appropriate agency when the ATM is in need of service. ATMs should be secured to an immoveable foundation. The internal safe that contains the money should be manufactured, tested and rated for strength and resistance to attacks. Internal components should be protected in such a way that a single individual cannot gain access. This insures that at least two people are present with separate access codes and/or keys in order to gain access to the ATM. Mirrors should be installed to allow customers to see their surroundings while they are transacting at an ATM, but not allow others to see what they are doing. The keypad and screen of the ATM should be located in such a way that the customers body naturally blocks the keypad when it is being used. ATM usage should be monitored and analyzed to insure that each ATM is appropriately stocked with cash to meet customer demands. Networks The banks internal network should not be exposed to public networks such as the Internet. Data protocols should be in place to validate that data is both transmitted and received in its original form. Data that does not pass validation should be rejected and logged. Network security software should be installed that constantly monitors the network for patterns and signs of attempted or actual unauthorized access. Activity that represents a threat must trigger an alarm to appropriate agencies and personnel. Bibliography The following resources were used as reference material for the preparation of this document. Office of Thrift Supervision Staff Summary of USA Patriot Act. Department of Treasury. 20

Friday, September 20, 2019

Coca Colas product range and services

Coca Colas product range and services Coca-Cola is a carbonated soft drink sold in the stores, restaurants, and vending machines of more than 200 countries. It is produced by The Coca-Cola Company of Atlanta, Georgia, and is often referred to simply as Coke (a registered trademark of The Coca-Cola Company in the United States since March 27, 1994). Originally intended as a patent medicine when it was invented in the late 19th century by John Pemberton, Coca-Cola was bought out by businessman Asa Griggs Candler, whose marketing tactics led Coke to its dominance of the world soft-drink market throughout the 20th century. The company produced concentrate which is then sold to licensed Coca-Cola bottlers throughout to the world. The bottlers, who hold territorially exclusive contracts with the company, produce finished product in cans and bottles from the concentrate in combination with filtered water and sweeteners. The bottles then sell, distribute and merchandise Coca-Cola to retails stores and vending machines. Such bottlers include Coca-Cola Enterprises, which is the largest single Coca-Cola bottler in North America and Western Europe. The Coca-Cola Company also sells concentrate for soda fountains to major restaurant and food service distributor. The Coca-Cola Company has, an occasion, introduce other cola drinks under the Coke brand name. The most common of these is Diet Coke, with others including Caffeine-Free Coca-Cola, Coca-Cola Cherry, Coca-Cola Zero, and special editions with lemon, lime, or coffee. (The Coca-Cola Company Profile, www.wikipedia.com, 2011) Product and Services The Coca-Cola Company sells the products form of soft drinks include beverage concentrates and syrups, with major beverage products. Business has more than 300 beverage brands all over the world with a major to be Coke, Fanta, Lift, Sprite, Frutopia 100% Fruit Juice, and Powerade. The Coca-Cola Company Beverages its packages into plastic bottles of sizes 2 liters, 1.25 liters, 600ml and 300ml. these are also available in aluminium cans of 375ml. Coca-Cola is the most well-known trademark, recognized by 94 percent of the world population. Business was very successful and has an excellent reputation. The price of Coca-Cola are various according to size, place, and packaging. Maybe if Coca-Cola sells in the school will have different price if the Coca-Cola sells in the bazaar or market, or if we compare the price of Coca-Cola in Indonesia will different in America. (My blog Dewi Irianty, 2011) As information from Coca-Cola Amatil (CCA) Indonesia (Profile Company, www.Coca-Colaamatil.co.id, 2011) Coca-Cola Bottling Indonesia (CCBI) is a manufacturer and distributor of soft-drinks in Indonesia. We manufacture and distribute products licensed from The Coca-Cola Company. In addition to providing quality products and high standards, we also provide the best support services, both for our customer (distribution partners) as well as consumers. To support the best service, the CCBI provides the National Contact Center (NCC), a service center for customer and consumers throughout Indonesia. NCC serves as a medium for customers and consumers who need information or any services related to the Company and the products of Coca-Cola. Services from the NCC include: Customer service which includes the request for a customers, refrigeration equipment, ordering products from both traditional and modern outlets, and other matters related to the distribution or sale; Customer service which includes product information, product quality and packaging, products promotion and activities; Frequently Asked Question which include the research, practice or internship and job vacancies the CCBI, request to visits to the factory CCBI, offering services and products for CCBI. The suggest 90% of our customers prefer to buy of Coca-Cola in a cold state. To support increase sales growth and push the level of benefits to our customers, the role of Cold Drink Equipment (cooling equipment) becomes important. Therefore, we always to ensure that the Cold Drink Equipment that are in all our outlets to function properly and have an interesting view. One of the special program conducted by Coca-Cola Bottling Indonesia to realize that goal is to provide new services, RED desk for customers who already have a cooler of Coca-Cola. Types of services available are: Receive and handle complaints of damage from the outlet of Cold Drink Equipment as well as the Sales Center Receive and handle request installation or withdrawal from the outlet of Cold Drink Equipment and Sales Center Answering question about the Cold Drink Equipment Services Coca-Cola Why the Coca-Cola Company goes to International Business it because they want to spread the product all over the world, and people will know the product. Beside that reason, the Coca-Cola also wants to raise the revenue and it will affect the production and the production will up because the demand of the product is growth up too. Its not about just the company get the advantage from this market, but the government will also get the revenue because The Coca-Cola Company do the export-import where there is a tax will raise the income of the government. The Coca-Cola Company is often appointed to be a sponsor of FIFA World Cup Football. Coca-Cola became sponsor of the World Cup almost every year held the World Cup including the 2010 World Cup. (www.google.com, www.scribd.com, 2011) The differences between across countries and home country The differences between across country and home country shown in the products they are produced. Each country have the different product although they have same name products, there are some products may be same. In Indonesia Coca-Cola Bottling Indonesia or Coca-Cola Company produced the products in the bottle with ordinary design and non-alcohol, it because in Indonesia the government not allowed it. But, in America they have extraordinary design with the different design every product. In Indonesia they dont have a unique design like the product of America, and in America they have many products of Coca-Cola. This matter of concern is supposed to be the core differences between across country and home country. (Products list of Coca-Cola, www.thecoca-colacompany.co.id, 2011), (Product Coca-Cola, www.google.com, 2011) Strategy To support their products The Coca-Cola Company has strategy to their products and their company, the strategy such as sales and marketing, manufacturing and distribution, and innovation. To support their sales and marketing, they designed many programs which are pointed to consumers and loyalty of their products. Sales and Marketing Promotion Various promotions designed not only to increase their sales and marketing, but also to continue improve their consumer satisfaction and loyalty of their products. Serving Their Customers Customer Service Center (CSC) is designed to continue improve their customer satisfaction and loyalty their products by providing superior levels of service to their customers based on their specific needs. Area Marketing Contractor Encourage by the companys limited resources to cost-effectively service certain operating areas directly and strong commitment to create job opportunities in the informal sector, Coca-Cola Bottling Indonesia (CCBI) continue develops its product distribution system through small and medium-sized business in Indonesia. Under the system, CCBI works with two mains of third parties: Area Marketing Contractors known as AMCs, and street vending. Serving their products At Coca-Cola Bottling Indonesia, we are commits to providing their customers with a range of Cold Drink Equipment to support their business. From ice chests for kiosk, to electric coolers for retail outlets, vending machines and street vending, we lend these facilities to the customer at no cost, so they can sells Coca-Cola Products cold op their consumers. HoReCa Having partnership with many hotels, restaurants, and cafes, their give many great offerings through HoReCa programs. (The Coca-Cola Company sales and marketing, www.coca-colaamatil.co.id , 2011) Manufacturing and Distribution The production of all products sold and distributed by Coca-Cola Bottling Indonesia takes place in Indonesia. There are ten production plants located throughout Indonesia. Over the years, our plants in Indonesia have been awarded prizes from the Coca-Cola Company for attaining standards above those similar plants located in others part of the world. All production plants meet and frequently exceed international standards and local regulatory requirements and undergo regular audits in the areas of quality control, environmental, health, and safety practices. Coca-Cola beverages products began as raw material and go through many stages as follows: Ingredients Preparations, Mixing, Washing, Filling Capping, Coding, Inspection, Packaging, and Loading. Coca-Cola will not only sell products to their customers but also give instructions on how to merchandise the product. Sales supervisors also regularly visit customers and provide advice and listen to any input that the customers may provide, it will be a great contribution to the company. Overall sales and distribution policy is directed by the National Office, located in Cibitung, Bekasi, but the execution of the policy is carried out by well qualified and experienced regional and area operational managers and their staff. Apart from that, the bottling plants in Indonesia always welcome visitors who would like to know more about explore their hygienic and state-of-the-art production process. Coca-Cola indicates their innovation through some continuance research and development activities. They try to develop Indonesia typical products. Moreover, many variations of packages and accessories are now easily found throughout Indonesia. The reputation of Coca-Cola in Indonesia was only recognized as the large forces with main carbonated beverage company, now has changed become total beverage company in line with the production of fast non-carbonated beverage. It commenced from the issuance of Frestea, tea beverage, on the last June 2002. Now it becomes the second largest fast beverage product in Indonesia. Furthermore, Coca-Cola has marketed Sunfill Syrup and powder, and Ades mineral water outside Jabodetabek. In the meantime, the packaging field always updates its innovations. After the Refillable Glass Bottle, Frestea, Produced a couple years ago; it has been produced in more relax package last year (Tetra Wedge). It is believed to be easier and practice to bring. In the end of 2003, Coca-Cola, Sprite, and Fanta appeared in the tiny can package of 250ml. In addition, there is Glass Bottle which is light to 30% in its weight with a very tiny design but strong. Now it has started to market in Bali and for the near c oming years will be marketing nationwide. Innovation on selling facilities also developed continuously in order to meet the need of consumers and the current technology development. Some of us had to believe that Information Technology approach is really essential for every stands of company. Meanwhile, Coca-Cola bottling Indonesia has non-pollution materials. Besides increasing selling productivities, those new crates are expected to enhance the product of Coca-Cola in Indonesia. These continuous innovations have proven which as one of the famous beverage company in the world, Coca-Cola wants to provide its best for the consumers. New idea has presented and continuous investments have made in order to become the best beverage company in the world. (The Coca-Cola Company manufacturing and distribution, www.coca-colaamatil.co.id , 2011) Innovation The Coca-Cola Company tries to make new innovation to develop their products. In addition, more packages and interesting accessories are now easily found throughout Indonesia. The reputation The Coca-Cola Company in Indonesia which is previously recognize as the main carbonated beverage company, has now changed become total beverage company in line with the production of fast non-carbonated beverage. It commenced from the issuance o f Frestea, Tea Beverage, on the last June 2002. Now, it becomes the second largest fast beverage product in Indonesia. Furthermore, Coca-Cola has marketed Sun Fill syrup and Powder, and Ades mineral water outside Jabotabek. In the field of packaging, Coca-Cola always updates its innovation. After Refillable Glass Bottle, Frestea, produced a couple years ago; it has been produced a last year in more relax package (Tetra Wedge) which is easier and more practice to bring. In the end of 2003, Coca-Cola, Sprite, and Fanta appeared in the tiny can package of 250ml. In addition there is Glass Bottle which is light to 30% in its weight with a very tiny design but strong. Now it has started to market in Bali and for the near coming years will be marketed nationwide. Innovation in selling facilities also developed continuously to meet the need of consumers and the current technology development. Coca-Cola Bottling Indonesia has non pollution materials. Besides increasing productivities, those new creates are expected to enhance the product of Coca-Cola Indonesia. Those continuous innovations have proven that as one of the famous beverage company in the world, Coca-Cola wants to provide its best for the consumer. New idea has presented and continuous investments have made in order to become the best beverage company in the world. (The Coca-Cola innovation, www.coca-colaamatil.co.id , 2011) Culture Culture is a part of external influences that impact the consumer. That is culture represents influences that are imposed on the consumer by other individuals. The culture every country is different, not just about culture of country but the company has also culture for their company. To gain their business, The Coca-Cola Company focus in all aspect such as focus in product, commitment to people development, graduate trainee program, job vacancy and the others. To keep the quality of product The Coca-Cola Company always controls the products to not disappointing the consumer. The Coca-Cola Company also held the events for their employees such as games, party, etc. The Coca-Cola Company has commitment for their company to always keep the believing from the peoples. (Lars Perner, Ph.D, www.consumerpsychologist.co.id , 2011) (www.coca-colaamatil.co.id , 2011) Analyzes of PESTEL (Political-Economical-Social-Technological-Environmental-Legal) Political The non-alcoholic beverages falls in the category under the FDA and the government plays a role within the operation of manufacturing these products. For those companies that didnt meet the standard requirement which have been set by law, an amount of fines shall be deemed. The changes in laws and regulations, such as accounting standards, taxation requirements and environmental laws and foreign jurisdictions might affect the book of the company as well as their entry in foreign country. Apart from that, the changes in the nature of business as non-alcoholic beverages can gain competitive product and pricing pressures and the ability to improve or maintain the share in sales in global market as a result of action by competitors. An overview to the country internal markets and other governmental changes that affects their ability to penetrate the developing and emerging markets that involves the political and economic conditions. Indeed, Coca-cola always anticipates any changes in the political field and continuously monitoring the policies and regulations set by government. In the political variables, most of the things are related to Governmental activities. So, they dont leave any good or bad impact in the Industry of coke. Economical The issue of recession and inflation rates may affect the industry of coke. Non-alcoholic and alcoholic beverages are also stands for good impact for a certain countries. Non-alcoholic beverages will stand better for Indonesia, Japan, Germany, and so on. On the other hand, alcoholic beverages will collect a high demand in USA, Australia, New Zealand, etc. It is supposed that economic have a negative impact to the demand of coca-cola products when the price changed because of recession and inflation. The economic situation of a country shall be strong in order to adapt to the economical changes. Social Lifestyles and attitudes of the market are supposed to change in a lifetime. It is also observed that the overall content in this world is categorized as baby boomers. This will continue to affect the non-alcoholic beverage industry by increasing the demand overall and in the healthier beverages. The main result is the decreasing demand for the carbonated drinks and is going to pull down the revenue of coca-cola. Technological IT department is demanded to be the most functional field. This creates opportunities for new products and product improvements in terms of marketing and production. New products always come along with the advance of technology. Through computers coke can increase the efficiency of its business and can have up -to-date data about their productions. This will be a way to monitor the needs of consumer. Environmental The Coca-Cola Company is providing consumers with simple moments of uniquely satisfying refreshment. The Coca-Cola Company work hard to infuse the environmental, health, and safety performance. Before The Coca-Cola Company discharge wastewater into a natural body of water, they treat that discharge water to a level capable of supporting fish life. Recognizing that environmental, health, and safety issues change as our understanding of these issues grows, they have developed a comprehensive system that follows international standards (including ISO 14001) and complies with the prevailing laws and regulations. All plants are audited regularly and have solid environment health and safety practices from waste management and reuse to occupational health and safety programs. Beyond the satisfaction of doing the right thing, our responsibility goes to the Indonesian people whose lives touch every day, and that responsibility includes conducting their business in ways that protect environment and promote the health and safety of our employees at the work places. Environment policy: PT. Coca-Cola Bottling Indonesia has commitment to always comprehend, prevent and reduce any negative impacts on environment due to its production process, to continuously provide high quality services and products to its customers and consumers, and to create a safe working environment. (The Coca-Cola Company environment, www.coca-colaamatil.co.id , 2011) Legal Legal aspect emphasizes on the effect of the national and world legislation. The industry of Coke receives all the rights applicable in the nature of their business. Every inventions and product developments are always going into the patented process led by governmental rules and regulations. This kind of legal approach leads to no highly negative impacts to industry of Coke as prescribed in Presidential decree. (http://ivythesis.typepad.com/term_paper_topics/2009/12/pestle-analysis-on-coca-cola.html ) Three Majors are very important from PESTEL Economical A few of economical crisis rises in many countries, especially underdeveloped and developing countries. Both categories seem not to have a strong economic level compared to developed countries. Inflation and recession will cause the economical situation of those countries to be unstable. Prices can be absurd and unaffordable. This will establish a pick from the demand which means stingy demand. The revenue of coca-cola industry will be decreased in many possible ways. In conclusion, the sales projection will be higher than realization. Bad reputation will then create another negative impact to the other fields of consequences. Social The lifestyle, trends, and culture of each country are all different. The countries such as Indonesia, Japan, Germany, Fiji, Papua Guinea, are approaching Sparkling beverages, still beverages, but not alcoholic beverages. This means industry of coke have to determine their products distribution in a simultaneous way. Producing the non-alcoholic beverages in such countries mentioned above will be able to collect a vast number of demands. Producing alcoholic beverages will be only wasted and only produced in a limited number which resulting in higher prices than the other products. This condition may not be affecting a country such as USA and Australia. Both of them are multicultural and many products are acceptable in both countries. The only trouble is only the competitors such as Pepsi and Nestle. Technology Apart from all the other filed, technological do affect most industry even Coca-Cola company. By using technology advantages, most developed industries in the world are having the advancement of technology as the source of their success. The core benefits are information, marketplace, and products development. Information always flows from the industry to the customers and vice versa. An industry is a physical form of conceptual plan. Every industry has to convert the source of information into data. The data can be accessed by customers in order to give reliable feedback to the industry itself. This will be the access point to the marketplace. Every country seems to have different tastes and needs. In this term, industry of coke can segment the market with potential demand. The potential demand may be differentiated into some categories. Meanwhile, the industry of Coke can do products development in order to fulfill the needs of consumer. This kind of monitoring session will bring up the flow into information again. Then, industry of Coke will have the updated information from customer again. Moreover, by the information received, industry of Coke can provide new information about their developed products and any promotion and details about the company.

Thursday, September 19, 2019

To Kill a Mockingbird by Harper Lee :: Free Essay Writer

To Kill A Mockingbird First impressions of people are often lasting impressions,especially in the minds of children. Unfortunately, these impressionstend to be negative, thus, discrediting the individual who conveys theimpression and causing the observers to inaccurately assess his truecharacter. Many times these impressions, aided by misunderstanding andprejudgment, cause unjust discrimination against an individual. Tokill a Mockingbird depicts the themes of misunderstanding andprejudice which portray Arthur (Boo) Radley as a villain. Through theprogressive revelation of Radley's character, the children realizethat their negative impressions and fears toward him were unfounded.Through gradual stages of change, Jem's, Scout's, and Dill'simpressions of Radley are dramatically altered, bringing them to therealization that he is not the evil man he was thought to be, butrather a caring individual of distinguished bravery, and truly, thehero of the novel. In the beginning of the novel many falsehoods portray Boo Radleyas a villain . These deluding opinions, very apparent in the adultcommunity, are well illustrated by Miss Stephanie Crawford. She helpsto mislead the children's impressions. Since Atticus, although ofteninterrogated, but not wanting to create a breach of etiquette, refusesto speak about the Radleys. Therefore, Jem receives most of hisinformation from Miss Stephanie Crawford, a neighborhood scold, whoinsists she knows the whole truth about the Radleys. It is fromCrawford that the children learn of Radley's scissor attack on hisfather and other such interesting rumors. Thus, Arthur Radley islabelled as a "hant", a possibly insane and dangerous man, and the"malevolent phantom." The latter, coming from the fact that Radley hadnot been seen for many years, and was believed to be responsible forpetty crimes around the neighbourhood. It is not solely Crawford whodisplays her distaste towards the Radleys, Calpurnia, also sharesthese feelings of hatred. Her dislike of Radley is well described inan offhand remark to the children: "T here goes the meanest man everGod blew breath into." (p.12) The children, aided by neighborhoodlegends, make their own conclusions about Radley. Based on prejudiceand myth, Jem compiles a very detailed description of Radley: Boo was about six-and-a-half feet tall, judging from his tracks; he dined on raw squirrels and any cats he could catch, that's why his hands were bloodstained-if you ate an animal raw, you could never wash the blood off. There was a long jagged scar that ran across his face; what teeth he had were yellow and rotten; his eyes popped, and he drooled most of the time. (p.13) Dill, through his curious and innovative character, also helps toheighten and shed light on the mystery around the Radley house.

Wednesday, September 18, 2019

Pearl Jam, Everclear, And No Doubt Essay -- essays research papers

Pearl Jam, Everclear, and No Doubt   Ã‚  Ã‚  Ã‚  Ã‚  Almost everyone has a favorite band. People buy CD's and tapes to not only listen to the music that they like, but to support that band. There are many, many different types of music, and usually a certain band will fit into a specific type of music. I listen mostly to alternative/grunge music. And by coincidence the three bands I'm going to talk about are all from the west coast. I am going to talk a little bit about three of my favorite bands in that category: Pearl Jam, Everclear, and No Doubt.   Ã‚  Ã‚  Ã‚  Ã‚  Pearl Jam is a band from Seattle. They were one of the first alternative bands to ever become popular from this area. The lead singer of Pearl Jam is Eddie Vedder, he does the lead vocals and plays t...

Tuesday, September 17, 2019

Busn311 Unit 2 Ip

Unit 2 – Probability and Distributions Leah Lopez American InterContinental University Abstract Within this email, I will cover different probabilities within your company. This information can help you to understand whether or not your employees are satisfied with their jobs or not. Also within the results of this survey, you will find that your employees are not distributed equally in terms of gender. Memo To: AIU From: Leah Lopez Date: November 13, 2012 Subject: Survey of employees at American Intellectual Union Dear AIU: Within this email, I will be providing some information from a survey that was given to your employees.This information can help you to understand how satisfied your workers are with their jobs. This will also help you to understand whether or not you should hire more women and men to even out the gender amongst certain departments. Overview of the Data Set The current data set is comprised of 64 individuals who were surveyed, and this is a part of the sam ple of the population at American Intellectual Union, and these individuals were identified by 5 characteristics: gender, age, position (hourly or salaried), tenure, and how they felt about job satisfaction on a scale of one to seven.The qualitative variables include: gender, department, and position. The quantitative variables include: age, tenure, and job satisfaction. Use of Statistics and Probability in the Real World There are several different ways that statistics and probability could be used in the real world. You could see this used in the horse races, the lottery, certain things in the stock market, also in marketing in a corporation. The Value of Statistics Every corporation that is successful exhausts statistics.It does not matter if they are operating a small fish store or they are a member of a board for a huge business, almost every decision made by a corporation is based on statistics. Averages, means and medians are a part of a business’s everyday life. Wheth er it is a chart, a data set, a correlation, or a bias, there is some sort of tool that will make sure your company is successful (Ayres, 2009). Data sets are one of the easiest statistical devices for businesses and one that you will probably exhaust daily without realizing it.When a person is reading over his/her bank statements, and taking care of daily business, they are more than likely going over a data set. When you pick up the morning paper and look at how your company's stock is performing, you are looking at figures gleaned from a data set. When using the words average, mean or deviation, you’re describing statistical tools that are currently being exhausted in your business (Ayres, 2009). Charts aren't just a pretty picture of an aspect of your business they are a visual representation of a data set.Whether you are looking at a bar chart of sales or a pie chart of company profits, these snapshots can tell you where your business is performing well and where it is p erforming poorly. From bank balances to employee compensation, charts and graphs can give you a visual picture of any part of your company which deals with data (Ayres, 2009). Correlations are where one event causes another. For example, you may notice that customers who buy a certain type of product are more likely to purchase another type of product.However, just because you think one event is causing another doesn't necessarily make it true; it could be a coincidence. Correlation analysis allows you to figure out whether one event is causative or not. A knowledge of correlations can be invaluable in planning sales and marketing campaigns (Ayres, 2009). Every business uses or produces some kind of statement or resolution; however, these may not always come out to be reliable. Errors may be present in the data collection, different sources do not always have the same information and there also could be mistakes in he calculations. Bias is when statistical results are different from the real — or true — value. A knowledge of bias will help you to understand which results are worth using for your business (Ayres, 2009). Distributions A distribution table can keep all of this information (numbers, row data) handy. A person can look, and say, oh, the participants in this survey were 75% male, or 25 % female. The managers can â€Å"see† the information and not just the raw data.Then complete the following distribution tables. Please pay attention to whether you should present the results in terms of percentages or simple counts. Distribution of Individuals by Gender |Gender |Percentage | |Females |50% | |Males |50% | Tenure with Company Distribution by Gender Please note that you do NOT have to convert these into percentages. You may leave them in a count format. |Under 2 years |2-5 Years |Over 5 years | |Male | |8 |11 | | |13 | | | |Female | |10 |3 | | |19 | | | Percentage of the Survey Participants in Each Department |Department |Percentage | Information Technology |34% | |Human Resources |25% | |Administration |41% | Sample Mean for Extrinsic Value by Gender |Gender |Mean Extrinsic Value | |Male |5. 32 | |Female |5. 36 | Probabilities The probabilities that will be calculated here are that an individual will be between the ages of 16-21; that an individual’s overall job satisfaction will be 5. 2 or higher; females working in human resources; and an individual’s intrinsic satisfaction is 5 or more.This information will be useful to AIU because they can look at these probabilities and find out what they need to change to increase job satisfaction, and they can also see whether or not they have an equal amount of females and males working in each department. |Classification |Count |Probability | |Probability that an individual will be between |18 |28% | |16–21 years of age | | | |Probability that an individual’s overall job |35 |55% | |satisfaction is 5. or lower | | | |Probability that an ind ividual will be a female |5 |8% | |in the human resources department | | | |Probability that an individual will be a |12 |19% | |salaried employee whose intrinsic satisfaction | | | |value is 5 or more | | | Probabilities in the Business World The theory of probability is actually the study of non-planned happenings. This type of study, of course, is math-related, and started when people would try to win card and dice games for money. Each and every decision that is made in a business setting has some sort of risk involved with it. With this being said, it seems that in the business setting, probability would be used to handle a business’s financial risks.Even the choices that are made by management have a probability of succeeding or (S. , 2010). Conclusion I hope that you have found all of the information within this survey of use. Using the information within this email can help you to improve working conditions for your employees. Sincerely, Leah A. Lopez Senior Board Mem ber References Ayres, I. (2009, August 13). The Value of Statistics. Retrieved from Freakonomics: http://www. freakonomics. com/2009/08/13/the-value-of-statistics/ S. , E. (2010). How Probability is Used in Business. Retrieved from Reference. com: http://www. reference. com/motif/science/how-probability-is-used-in-business